User Information Security Awareness! Trivia Quiz

20 Questions | Total Attempts: 5675

SettingsSettingsSettings
Please wait...
User Information Security Awareness! Trivia Quiz

Information security awareness is a developing part of information security that focuses on raising consciousness regarding potential risks of the swiftly evolving forms of information and the threats to that information that deliberately targets the user. If you are interested in user information security awareness, look no further than this quiz.


Questions and Answers
  • 1. 
    Why is it important to have a good understanding of Information Security policies and procedures? 
    • A. 

      Helps protect individuals from being victims of security incidents.

    • B. 

      Provides an understanding of steps to follow in the event of a security incident

    • C. 

      Helps to understand levels of responsibility

    • D. 

      All of the above

  • 2. 
    Which of the following is a good way to create a password?
    • A. 

      Your children's or pet's names

    • B. 

      Using look-alike substitutions of numbers or symbols

    • C. 

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D. 

      Using common names or words from the dictionary

  • 3. 
    Which of the following would be the best password?
    • A. 

      MySecret

    • B. 

      Dp0si#Z$2

    • C. 

      Abc123

    • D. 

      Keyboard

  • 4. 
    What is the most common delivery method for viruses?
    • A. 

      Email

    • B. 

      Instant Message

    • C. 

      Internet download

    • D. 

      Portable media

  • 5. 
    • A. 

      Open the attachment to view its contents

    • B. 

      Delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 6. 
    Which of the following is a good practice to avoid email viruses?
    • A. 

      Delete an unexpected or unsolicited message

    • B. 

      Use anti-virus software to scan attachments before opening

    • C. 

      Delete similar messages that appears more than once in your Inbox

    • D. 

      All the above

  • 7. 
    Which of the following is a proper use of email?
    • A. 

      Never email personal information

    • B. 

      Send out pricelists for your home-based business products

    • C. 

      Forward inspirational and humorous emails to your co-workers to brighten their day

    • D. 

      Send an email to all your friends and co-workers to advertise a job opening in your area

  • 8. 
    Instant Messaging is safer than regular email.
    • A. 

      True

    • B. 

      False

  • 9. 
    • A. 

      Frustration with co-workers

    • B. 

      Stress

    • C. 

      Promotion

    • D. 

      Financial problems

  • 10. 
    A malicious user can rely on email or webpage to launch a ____?
    • A. 

      Phishing attacks

    • B. 

      Virus attacks

    • C. 

      Spyware

    • D. 

      All of the above

  • 11. 
    Which statement most accurately describes virus?
    • A. 

      A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources

    • B. 

      A program that protects your computer from hackers

    • C. 

      A program that is installed onto your computer that monitors your internet use

    • D. 

      All of the above

  • 12. 
    Which of the following is a measure for preventing a social engineering attack except:
    • A. 

      Do not give out computer or network information

    • B. 

      Do not complete confidential company tasks in an unsecure setting

    • C. 

      Do not secure sensitive documents and media

    • D. 

      Do not give out personal identifiable information

  • 13. 
    Which statement is allowed according to the limited personal use policy?
    • A. 

      Conducting business for personal gain

    • B. 

      Using company resources for political purpose

    • C. 

      Sending an occasional personal email

    • D. 

      Downloading music and video files

  • 14. 
    If you're not careful about your Internet browsing, which of the following can result?
    • A. 

      Spyware or Adware installation

    • B. 

      Browser Hijacking

    • C. 

      Information or identity theft

    • D. 

      All of the above

  • 15. 
    • A. 

      Avoid

    • B. 

      Recognize

    • C. 

      Challenge

    • D. 

      Log

  • 16. 
    • A. 

      Do not reply to the message

    • B. 

      Click the link so you can see what the site looks like

    • C. 

      Keep your system up to date, and install up-to-date antivirus and antispyware software

    • D. 

      Report the phishing email to the legitimate company or organization that has been spoofed

  • 17. 
    What should you do if you think your password has been compromised?
    • A. 

      Change your password

    • B. 

      Report the incident to the proper authorities - such as a system administrator(s)

    • C. 

      Check other systems that you have accounts on as they may be compromised as well

    • D. 

      All the above

  • 18. 
    All of these are good physical security practices except?
    • A. 

      Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work

    • B. 

      Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you

    • C. 

      When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body

    • D. 

      Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place

  • 19. 
    • A. 

      Instant Messaging, Peer-to-Peer (P2P) applications

    • B. 

      Malware - virus, worms, spyware

    • C. 

      Spam, Phishing attacks

    • D. 

      End Users

  • 20. 
    • A. 

      Computer security is part of everyone's job

    • B. 

      Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them..

    • C. 

      Report anything suspicious to your system administrator

    • D. 

      Do not ignore unusual computer functioning. It might be a sign of malware.